浏览全部资源
扫码关注微信
中国民航大学计算机科学与技术学院,天津 300300
[ "杨宏宇(1969-),男,吉林长春人,博士,中国民航大学教授,主要研究方向为网络信息安全。" ]
[ "孟令现(1990-),男,山东临沂人,中国民航大学硕士生,主要研究方向为云平台安全。" ]
网络出版日期:2017-09,
纸质出版日期:2017-09-25
移动端阅览
杨宏宇, 孟令现. Hadoop云平台用户动态访问控制模型[J]. 通信学报, 2017,38(9):9-17.
Hong-yu YANG, Ling-xian MENG. Hadoop cloud platform user dynamic access control model[J]. Journal on communications, 2017, 38(9): 9-17.
杨宏宇, 孟令现. Hadoop云平台用户动态访问控制模型[J]. 通信学报, 2017,38(9):9-17. DOI: 10.11959/j.issn.1000-436x.2017142.
Hong-yu YANG, Ling-xian MENG. Hadoop cloud platform user dynamic access control model[J]. Journal on communications, 2017, 38(9): 9-17. DOI: 10.11959/j.issn.1000-436x.2017142.
为解决Hadoop云平台无法动态控制用户访问请求的问题,提出一种基于用户行为评估的Hadoop云平台动态访问控制(DACUBA
dynamic access control based on user behavior assessment)模型。该模型首先实时收集用户指令序列,通过并行指令序列学习(PCSL
parallel command sequence learning)获取用户行为轮廓。然后利用前向轮廓建立全局K模型,对后续行为序列进行分类并对分类结果进行评估。随后将评估结果与改进Hadoop访问控制机制结合,使云平台用户的访问权限随自身行为动态改变。最后通过实验验证了模型算法的有效性和动态访问控制机制的可行性。
In order to solve the problem that Hadoop cloud platform could not dynamically control user access request
a Hadoop cloud dynamic access control model based on user behavior assessment (DACUBA) was proposed.The model first collected the user instruction sequence in real time and the user behavior contour was obtained by parallel command sequence learning (PCSL).Then the global K model was established by using the forward profile
the subsequent sequence was classified and the classification results were evaluated.The evaluation results were combined with the improved Hadoop access control mechanism to make the cloud platform users’ access rights change dynamically with their own behaviors.Experimental results demonstrate that the model algorithm is effective and the dynamic access control mechanism is feasible.
陆嘉恒 . Hadoop实战 [M ] . 北京 : 机械工业出版社 , 2012 .
LU J H . Hadoop in action [M ] . Beijing : China Machine Press , 2012 .
GUPTA C , SINHA R , ZHANG Y . Eagle:user profile-based anomaly detection for securing Hadoop clusters [C ] // IEEE International Conference on Big Data . 2015 : 1336 - 1343 .
TAN Z , TANG Z , LI R , et al . Research on trust-based access control model in cloud computing [C ] // Information Technology and Artificial Intelligence Conference . 2011 : 339 - 344 .
JING X , LIU Z , LI S , et al . A cloud-user behavior assessment based dynamic access control model [J ] . International Journal of System Assurance Engineering & Management , 2015 , 22 ( 12 ): 1 - 10 .
ZBURIVSKY D . Hadoop集群与安全 [M ] . 北京 : 机械工业出版社 , 2014 .
ZBURIVSKY D . Hadoop cluster deployment,securing Hadoop [M ] . Beiing : China Machine Press , 2014 .
JAIGANESH M , AARTHI M , KUMAR A V A . Fuzzy ART-based user behavior trust in cloud computing [J ] . Advances in Intelligent Systems& Computing , 2015 , 324 : 341 - 348 .
CHUA S L , MARSLAND S , GUESGEN H W . Unsupervised learning of patterns in data streams using compression and edit distance [C ] // The International Joint Conference on Artificial Intelligence . 2011 : 1231 - 1236 .
KRANEN P , KREMER H , JANSEN T , et al . Stream data mining using the MOA framework [C ] // International Conference on Database Systems for Advanced Applications . 2012 : 309 - 313 .
王昕 , 袁超伟 , 黄晨 . 基于滑动窗口机制的 RFID 自同步可扩展所有权变更协议 [J ] . 北京邮电大学学报 , 2013 , 36 ( 5 ): 30 - 35 .
WANG X , YUAN C W , HUANG C . Scalable and self-synchronizable RFID ownership transfer protocol based on the sliding window mechanism [J ] . Journal of Beijing University of Posts and Telecommunications , 2013 , 36 ( 5 ): 30 - 35 .
MAXION R A , TOWNSEND T N . Masquerade detection using truncated command lines [C ] // International Conference on Dependable Systems and Networks . 2002 : 219 - 228 .
TIAN X G , DUAN M Y , LI W F , et al . Anomaly detection of user behavior based on shell commands and homogeneous Markov chains [J ] . Chinese Journal of Electronics , 2007 , 17 ( 2 ): 231 - 236 .
李超 , 田新广 , 肖喜 , 等 . 基于 Shell 命令和共生矩阵的用户行为异常检测方法 [J ] . 计算机研究与发展 , 2012 , 49 ( 9 ): 1982 - 1990 .
LI C , TIAN X G , XIAO X , et al . Anomaly detection of user behavior based on shell commands and commands and co-occurrence matrix [J ] . Journal of Computer Research and Development , 2012 , 49 ( 9 ): 1982 - 1990 .
0
浏览量
823
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构